US20100262672A1 - Information processing apparatus, method and program - Google Patents
Information processing apparatus, method and program Download PDFInfo
- Publication number
- US20100262672A1 US20100262672A1 US12/752,385 US75238510A US2010262672A1 US 20100262672 A1 US20100262672 A1 US 20100262672A1 US 75238510 A US75238510 A US 75238510A US 2010262672 A1 US2010262672 A1 US 2010262672A1
- Authority
- US
- United States
- Prior art keywords
- operating system
- command
- data
- writing
- information processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/354—Card activation or deactivation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3558—Preliminary personalisation for transfer to user
Definitions
- the present application relates to an information processing apparatus, method and program, and, more particularly, to an information processing apparatus, method and program suitable for use in writing file system metadata of plural operating systems.
- a card has been disseminated which has a non-contact module capable of communicating in a non-contact manner by including an IC (integrating circuit).
- a card is called, for example, a “non-contact IC card” or the like, and is capable of communicating with other devices in a non-contact manner.
- the non-contact IC card is used for non-contact communication which has been adopted in, for example, transportation tickets, electronic money, ID cards, entrance-exit systems, and the like, and use of the non-contact IC card is widespread.
- non-contact IC card is configured to have an OS (operating system) suitable for each use (Japanese Unexamined Patent Application Publication No. 2007-87120 is an example of the related art).
- file system metadata of an operating system in the non-contact IC card is written using an interface specially prepared by a chip vendor in a factory manufacturing IC cards at the time of its manufacture.
- the interface, prepared by the chip vendor, for writing metadata is generally not kept secure.
- the file system metadata includes security information such as a key value and the like in a section of it. Therefore, an environment for writing file system metadata is preferably a place which can maintain security.
- An information processing apparatus includes, a transmission means for transmitting a command for a second operating system to the second operating system when receiving the command via a communication path which communicates under a control based on a first operating system, an extraction means for extracting data for the second operating system by analyzing the command transmitted from the transmission means, and a writing means for writing the data extracted by the extraction means as data constituting file system metadata of the second operating system.
- the information processing apparatus may further include the first operating system and the second operating system.
- the information processing apparatus may constitute an IC chip, an IC card, or a mobile phone.
- the transmission means may be provided in an HAL (Hardware Abstract Layer).
- HAL Hardware Abstract Layer
- An information processing method in an information processing apparatus having a transmission means, an extraction means and a writing means, includes the steps of transmitting a command for a second operating system to the second operating system when receiving the command via a communication path which communicates under a control based on a first operating system, by the transmission means, extracting data for the second operating system by analyzing the transmitted command, by the extraction means, and writing the extracted data as data constituting file system metadata of the second operating system, by the writing means.
- a program enables a computer to execute a processing according to an embodiment, in an information processing apparatus having a transmission means, an extraction means and a writing means, the processing including the steps of transmitting a command of a second operating system to the second operating system when receiving the command via a communication path which communicates under a control based on a first operating system, by the transmission means, extracting data for the second operating system by analyzing the transmitted command, by the extraction means, and writing the extracted data as data constituting file system metadata of the second operating system, by the writing means.
- a command for a second operating system is transmitted to the second operating system for analysis, when the command is received via a communication path which communicates under a control based on a first operating system, data for the second operating system is extracted, and the extracted data is written as data constituting file system metadata of the second operating system.
- An information processing apparatus includes a supply means for supplying a command for a second operating system to a transmission means when receiving the command via a communication path which communicates under a control based on a first operating system, a transmission means for transmitting the command supplied from the supply means to the second operating system, an extraction means for extracting data for the second operating system by analyzing the command transmitted from the transmission means, and a writing means for writing the data extracted by the extraction means as data constituting file system metadata of the second operating system.
- the information processing apparatus may constitute an IC chip, an IC card, or a mobile phone.
- the supply means may be provided in the first operating system.
- the transmission means may be provided in an HAL (Hardware Abstract Layer).
- HAL Hardware Abstract Layer
- An information processing method in an information processing apparatus having a supply means, a transmission means, an extraction means and a writing means, includes the steps of supplying a command for a second operating system to a transmission means when receiving the command via a communication path which communicates under a control based on a first operating system, by the supply means, transmitting the supplied command to the second operating system, by the transmission means, extracting data for the second operating system by analyzing the transmitted command by the extraction means, and writing the extracted data as data constituting file system metadata of the second operating system, by the writing means.
- a program enables a computer to execute a processing according to another embodiment, in an information processing method of an information processing apparatus having a supply means, a transmission means, an extraction means and a writing means, the processing including the steps of supplying a command for a second operating system to a transmission means when receiving the command via a communication path which communicates under a control based on a first operating system, by the supply means, transmitting the supplied command to the second operating system, by the transmission means, extracting data for the second operating system by analyzing the transmitted command by the extraction means, and writing the extracted data as data constituting file system metadata of the second operating system, by the writing means.
- a command for a second operating system is transmitted to the second operating system for analysis, when the command is received via a communication path which communicates under a control based on a first operating system, data for the second operating system is extracted, and the extracted data is written as data constituting file system metadata of the second operating system.
- FIG. 1 is a diagram of an information processing system according to an embodiment
- FIG. 2 is a flowchart illustrating an operation of the information processing system
- FIG. 3 is a diagram illustrating a configuration of another information processing system according to an embodiment
- FIG. 4 is a flowchart illustrating another operation of the information processing system
- FIG. 5 is a diagram illustrating a configuration of an IC card
- FIG. 6 is a diagram illustrating a configuration of an IC card
- FIG. 7 is a diagram illustrating a configuration of an IC card
- FIG. 8 is a flowchart illustrating a processing by a command dispatcher
- FIG. 9 is a diagram illustrating a command
- FIG. 10 is a flowchart illustrating a processing by a first operating system command analysis module
- FIG. 11 is a flowchart illustrating a processing by a metadata writing module
- FIG. 12 is a diagram illustrating metadata
- FIG. 13 is a diagram illustrating raising an event
- FIG. 14 is a diagram illustrating another configuration of the IC card
- FIG. 15 is a diagram illustrating still another configuration of the IC card
- FIG. 16 is a flowchart illustrating a processing by a first operating system command through applet.
- FIG. 17 is a diagram illustrating a recording medium.
- FIG. 1 is a diagram illustrating a configuration of an information processing system according to an embodiment.
- An information processing system 10 shown in FIG. 1 has an event server 11 , an event processing unit 12 , a communication processing unit 13 , a first communication path 14 , an IC card 15 , and a second communication path 16 .
- the event server 11 includes the event processing unit 12 and the communication processing unit 13 .
- the event server 11 communicates with the IC card 15 via the first communication path 14 .
- the IC card 15 communicates with a server (not shown) or the like via the second communication path 16 .
- the first and second communication paths are communication paths used when communications are performed under controls based on different operating systems, respectively. For example, when the IC card 15 performs communication under a control based on a first operating system, the communication is carried out using the first communication path 14 . In addition, for example, when the IC card 15 performs communication under a control based on a second operating system, the communication is carried out using the second communication path 16 .
- the first operating system and the second operating system are different from each other.
- the IC card 15 may include both the first operating system and the second operating system, or may include the second operating system.
- the present application is not limited to the configuration including one or two operating systems. In other words, the present application is applicable to an IC card including a plurality of operating systems.
- the first operating system is, for example, a Java Card OS, or the like.
- the Java Card OS as a card application can mount additional functions onto itself.
- the first operating system is described as, for example, the Java Card OS, throughout the specification; however, it may be, for example, a MULTOS OS or a Native OS of a reader as well as the Java Card OS.
- the second operating system is, for example, a FeliCa OS or the like.
- the FeliCa (trademark) OS is used for a card which is employed as electronic money, and the card replaces a credit card or a prepaid card and is used in business transactions.
- the FeliCa OS can write a numerical value indicating electronic money in a predefined region afterwards and define a range of a region used as electronic money afterwards.
- the event processing unit 12 of the event server 11 generates a command for the second operating system.
- the generated command is supplied to the communication processing unit 13 .
- the communication processing unit 13 converts the supplied command into a command which can be treated by the first operating system (a command which can be analyzed by the first operating system).
- the command supplied from the event processing unit 12 is transmitted to the IC card 15 via the first communication path 14 which communicates under the control based on the first operating system.
- the communication processing unit 13 receives data (for example, a later-described command reply) from the IC card 15 via the first communication path 14 .
- a processing carried out by this system principally, the event server 11 will be described with reference to a flowchart in FIG. 2 .
- a configuration or an operation of the IC card 15 is described in detail. To begin with, an operation of the system is further described.
- the event processing unit 12 of the event server 11 generates a command directed to the second operating system.
- the generated command described later is a command and so on, for example, including data used by the second operating system for the event processing.
- the generated command is supplied to the communication processing unit 13 .
- the communication processing unit 13 converts the supplied command into a command of the first operating system.
- the communication processing unit 13 transmits the converted command to the IC card 15 via the first communication path 14 .
- the event server 11 converts the command of the second operating system into the command which can be treated by the first operating system, and transmits it to the IC card 15 via the first communication path 14 which communicates under the control based on the first operating system.
- the IC card 15 processes the received command by carrying out a processing described later and transmits a command reply including the processing result. The transmission is also performed using the first communication path 14 .
- the communication processing unit 13 of the event server 11 receives the command reply from the IC card 15 .
- the communication processing unit 13 extracts predetermined data from the received command reply, and supplies the extracted data to the event processing unit 12 as results processed by the IC card 15 alongside the processing at Steps S 11 to S 13 . If an error occurs in the data, a processing such as retransmission of data and the like is executed.
- FIG. 3 is a diagram illustrating a configuration according to another embodiment.
- An information processing system 30 shown in FIG. 3 has an event server 11 , an event processing unit 12 , a communication processing unit 13 , a first communication path 14 , an IC card 15 , a second communication path 16 , and an NFC-RW 31 .
- the elements with the same functions as those of the information processing system 10 shown in FIG. 1 are given the same reference numerals, and the description thereof will be appropriately omitted.
- the information processing system 30 shown in FIG. 3 has a configuration in which the NFC-RW 31 is added to the information processing system 10 shown in FIG. 1 .
- the NFC-RW 31 is provided between the event server 11 and the first communication path 14 .
- NFC stands for near field communication and RW stands for reader/writer.
- NFC is a communication protocol which can handle a plurality of communication formats in non-contact near wireless communication. According to the non-contact near wireless communication using this NFC, for example, a reader and a writer can perform a non-contact near wireless communication with a plurality of non-contact IC cards 15 corresponding to communication formats different from each other.
- the processings at steps S 31 and S 32 are the same as those at steps S 11 and S 12 in the flowchart shown in FIG. 2 , wherein the command for the second operating system is generated and is converted into the command which can be treated by the first operating system.
- the communication processing unit 13 transmits the command generated by the event processing unit 12 to the NFC-RW 31 .
- the communication processing unit 13 and the NFC-RW 31 are connected to each other in a wired or a wireless manner. Also, the communication processing unit 13 and the NFC-RW 31 may be connected to each other via a predetermined network.
- the NFC-RW 31 transmits the supplied command to the IC card 15 via the first communication path 14 . This communication is performed in a non-contact manner.
- the communication processing unit 13 receives a command reply from the IC card 15 via the first communication path 14 and the NFC-RW 31 .
- the event server 11 converts the data of the second operating system into data of a format which can be treated by the first operating system, and transmits the command to the IC card 15 via the first communication path 14 which communicates under the control based on the first operating system.
- the IC card 15 receiving this command will be described.
- FIG. 5 is a diagram illustrating a configuration of the IC card 15 .
- the IC card 15 shown in FIG. 5 has an HAL (Hardware Abstraction Layer) 101 , a command dispatcher 102 , a first operating system 111 , an applet 112 , an applet 113 , a firewall 121 , a second operating system 131 , a first operating system command analysis module 132 , a metadata writing module 133 , a second operating system file metadata 134 , a second operating system command analysis module 135 , and a second file module 136 .
- HAL Hardware Abstraction Layer
- the HAL 101 is configured to have the command dispatcher 102 .
- This command dispatcher 102 supplies (transmits) a command transmitted via the first communication path 14 to the first operating system 111 or the second operating system 131 , by referring to predetermined data contained in the command.
- the command dispatcher 102 receives a command for the second operating system 131 via the first communication path 14 which communicates under the control based on the first operating system 111 , and transmits the received command to the second operating system 131 .
- the HAL 101 has a function of concealing the difference between different pieces of hardware. For example, even when using different pieces of hardware, an operating system can have access to each of the different pieces of hardware via the same interface.
- the use of the HAL 101 with such a function enables the hardware and the HAL to be changed without changing the mounting of the operating system, and therefore the operating system can use the same function.
- the use of the HAL 101 allows the command dispatcher 102 to be used even when an algorithm is changed in transmitting and receiving data, for example, via the first communication path 14 , and thus the data can be transmitted and received using the same algorithm although the command dispatcher 102 is any type of interface. That is to say, an event algorithm described below can be applied by adopting the HAL 101 , regardless of the type of command dispatcher 102 .
- the first operating system 111 includes the applet 112 and the applet 113 .
- the first operating system 111 is, for example, the Java Card OS, and the applet 112 and the applet 113 are programs run by the Java Card OS.
- the first operating system 111 and the second operating system 131 are configured to have no access to each other. In order to have no access to each other, the firewall 121 is provided between the first operating system 111 and the second operating system 131 .
- the second operating system 131 includes the first operating system command analysis module 132 , the metadata writing module 133 , the second operating system file metadata 134 , the second operating system command analysis module 135 , and the second file module 136 .
- the first operating system command analysis module 132 analyzes a command supplied from the command dispatcher 102 and extracts predetermined data for the second operating system 131 therefrom.
- the command supplied to the first operating system command analysis module 132 is converted into a format which can be treated by the first operating system 111 , although it is a command for the second operating system 131 .
- the command supplied to the first operating system command analysis module 132 is a command undertaking communication in a state where security is maintained, by using a function concerning encrypted communication of the first operating system 111 .
- the first operating system command analysis module 132 is included in the second operating system 131 ; however, it has a function of analyzing the command for the first operating system 111 , or of decrypting the command to which the encryption function of the first operating system 111 has been applied.
- the data from the first operating system command analysis module 132 is supplied to the metadata writing module 133 .
- the metadata writing module 133 writes the data from the first operating system command analysis module 132 in the second operating system file metadata 134 .
- the extracted data is data constituting the second operating system file metadata 134 .
- the metadata writing module 133 writes such data.
- the frame of the second operating system file metadata 134 shown in FIG. 5 is marked with dotted lines. This indicates that the second operating system file metadata 134 works only after the metadata is written in the second operating system file metadata 134 by the metadata writing module 133 .
- the second operating system command analysis module 135 and the second file module 136 also work only after the metadata is written in the second operating system file metadata 134 , and thus the frame thereof is marked with dotted lines as well in FIG. 5 .
- the second operating system command analysis module 135 obtains and analyzes a command for the second operating system 131 supplied via the second communication path 16 .
- the analysis result is supplied to the second file module 136 .
- the second file module 136 carries out a processing based on the analysis result from the second operating system command analysis module 135 .
- the second operating system 131 it is possible to include additional services in the second operating system 131 , as shown in FIG. 6 .
- the service 137 or the service 138 is added after the metadata is written in the second operating system file metadata 134 , and thereby the second operating system file metadata 134 , the second operating system command analysis module 135 and the second file module 136 work, respectively.
- the second operating system 131 is assumed as the FeliCa (trademark) OS, which is used as a card for use as electronic money, the card replaces a credit card or a prepaid card and is used in business transactions.
- the service 137 or the service 138 is for offering a credit card service or a prepaid card service.
- the second file module 136 controls the service 137 or the service 138 on the basis of the data from the second operating system command analysis module 135 .
- the first operating system command analysis module 132 , the metadata writing module 133 , the second operating system command analysis module 135 , and the second file module 136 are stored in, for example, a read only memory such as a ROM (Read Only Memory) or the like.
- the second operating system file metadata 134 , the service 137 and the service 138 are stored in a non-volatile memory, for example, an EEPROM (Erasable Programmable ROM) or the like.
- a processing for writing the second operating system file metadata 134 will be described below.
- the processing for writing the second operating system file metadata 134 is carried out by the second operating system 131 , and therefore the first operating system 111 may not be included in the IC card 15 . That is to say, the IC card 15 may have a configuration as shown in FIG. 7 .
- the IC card 15 shown in FIG. 7 has a configuration in which the first operating system 111 and the firewall 121 are removed from the IC card 15 shown in FIG. 5 . Even this configuration can perform the processing for writing the second operating system file metadata 134 described below.
- the command dispatcher 102 receives a command via the first communication path 14 .
- the command dispatcher 102 determines a transmission destination with reference to data (identifier and so on) recorded in a predetermined region in the received command.
- the command is set to be transmitted to the second operating system 131 . This flow of the processings is carried out when the data which has been referred to at step S 102 indicates a command directed to the second operating system 131 .
- the received command in this flow of the processings, that is, when the command dispatcher 102 sets the received command to be transmitted to the second operating system 131 , will be described.
- the received command in this flow of the processings is a command referred to as a Select command.
- the Select command is used in selecting files, and so on.
- a command 161 shown in FIG. 9 has a CLA region 171 , an INS region 172 , a P 1 region 173 , a P 2 region 174 , an LC region 175 , a DATA region 176 , and an LE region 177 .
- An instruction class is written in the CLA region 171
- an instruction code is written in the INS region 172
- an instruction parameter 1 is written in the P 1 region 173
- an instruction parameter 2 is written in the P 2 region 174 .
- the number of bytes of the DATA region 176 in the command 161 is written in the LC region 175 , command data is written in the DATA region 176 , and the maximum number of bytes expected in a data field of a response to the command is written in the LE region 177 .
- the command 161 is the Select command
- “A4” which is an identifier indicating that this command is the Select command
- the command dispatcher 102 recognizes the Select command when the “A4” is written in the INS region 172 of the received command 161 .
- the DATA region 176 is referred to.
- the operating system of the destination is assumed as the second operating system 131 .
- the command dispatcher 102 receives the Select command, and thereafter there is a possibility that it receives commands frequently.
- the command dispatcher 102 receives the Select command and sets commands received since then to be transmitted to the second operating system 131 , and thereby the commands received since then are transmitted to the second operating system 131 .
- data constituting the second operating system file metadata 134 is written in the DATA region 176 (which will be described in detail with reference to FIGS. 12 and 13 ), although not shown.
- the command dispatcher 102 transmits the command 161 received via the first communication path 14 to the second operating system 131 .
- the second operating system 131 receives the command 161 from the command dispatcher 102 by the first operating system command analysis module 132 . Thereafter, a processing described later is carried out in the second operating system 131 , and a command reply indicating the processing result is output to the command dispatcher 102 from the second operating system 131 .
- the command dispatcher 102 obtains the command reply at step S 105 .
- the obtained command reply has been converted into a format which can be treated by the first operating system 111 .
- the command dispatcher 102 at step S 106 , transmits the obtained command reply to the event server 11 via the first communication path 14 .
- the setting of transmission to the second operating system 131 is canceled.
- the command dispatcher 102 receives the command from the event server 11 , and sets the obtained command to be transmitted to the first operating system 111 or the second operating system 131 by referring to the information contained in the command. This setting is performed by the command dispatcher 102 , and thereby even when the command of a format which is treated by the first operating system 111 is received via the first communication path 14 , the command can be transmitted to the second operating system 131 . This enables the following processing to be carried out in the second operating system 131 .
- a processing carried out by the first operating system command analysis module 132 of the second operating system 131 will be described with reference to a flowchart in FIG. 10 .
- the first operating system command analysis module 132 obtains a command from the command dispatcher 102 . This processing is performed when the command dispatcher 102 performs the processing at step S 104 ( FIG. 8 ).
- the first operating system command analysis module 132 analyzes the obtained command at step S 132 . It extracts data from the command 161 by the use of the analysis result at step S 133 .
- the extracted data is data to be written as the second operating system file metadata 134 and is described later with reference to FIG. 12 or FIG. 13 .
- the extracted data is supplied to the metadata writing module 133 .
- the first operating system command analysis module 132 is included in the second operating system 131 ; however it has a function of analyzing the command for the first operating system 111 in order to extract the data for the second operating system 131 .
- the first operating system command analysis module 132 can process the command of the format which is supplied from the command dispatcher 102 and is treated by the first operating system 111 .
- the first operating system command analysis module 132 obtains a command reply from the metadata writing module 133 at step S 134 .
- the first operating system command analysis module 132 converts the received command reply into the command reply of a format which can be treated by the first operating system 111 at step S 135 .
- step S 136 the first operating system command analysis module 132 supplies the command reply converted into a command reply for the first operating system 111 , to the command dispatcher 102 .
- the command dispatcher 102 carries out the processing at step S 105 ( FIG. 8 ).
- the first operating system command analysis module 132 extracts the data for the second operating system 131 from the command of the format which can be treated by the first operating system 111 .
- the first operating system command analysis module 132 also converts the data for the second operating system 131 into the command of the format which can be treated by the first operating system 111 .
- the first operating system command analysis module 132 performs these processings, and thereby the second operating system 131 can process the command of the format which can be treated by the first operating system 111 .
- the metadata writing module 133 obtains data from the first operating system command analysis module 132 . This processing is performed when the first operating system command analysis module 132 performs the processing at step S 133 ( FIG. 10 ).
- the metadata writing module 133 writes the obtained data as the second operating system file metadata 134 . For example, the data is sequentially written in the second operating system file metadata region 181 ( FIG. 13 ) which has been secured in the memory.
- step S 163 it is determined whether or not the writing of the data is completed.
- the metadata writing module 133 determines the writing of the data is completed when the data is normally written as the second operating system file metadata 134 or when an error occurs for a certain reason.
- the processing returns to step S 161 until the writing of the data is determined to be completed, and thus the processing since then is repeated so that the writing of data is continuously performed.
- step S 163 if the writing of the data is determined to be completed, the processing at step S 164 is performed.
- the metadata writing module 133 generates a command reply for output to the first operating system command analysis module 132 .
- a command reply indicating that the writing is normally completed is generated, and when the writing is completed due to occurrence of any errors, a command reply indicating the occurrence of errors is generated.
- the command reply output from the metadata writing module 133 is received by the first operating system command analysis module 132 as the processing at step S 134 ( FIG. 10 ).
- the second operating system file metadata 134 is written, and thereby the IC card 15 lies in a state of beginning the processing in the second operating system 131 .
- the second operating system file metadata 134 is written, and thereby the second operating system command analysis module 135 or the second file module 136 can work.
- the service 137 or the service 138 is registered so as to be available after the registration, and thereby the IC card 15 lies in a state of offering the service.
- FIG. 12 is a diagram illustrating a relation between a configuration of the second operating system file metadata 134 and service data of the service 137 ( 138 ).
- the second operating system file metadata 134 includes a second operating system identification number for identifying the second operating system 131 , an authentication key for the second operating system which is used for communicating with other devices via the second communication path 16 ( FIG. 6 ), and a second operating system file size indicating a file size.
- the second operating system file metadata 134 includes a second operating system memory management bit map which is address information of data constituting the second operating system file metadata 134 , and a second operating system service management table which is a table for managing, for example, the service 137 or the service 138 ( FIG. 6 ), which runs on the second operating system file metadata 134 .
- the second operating system service management table includes a second operating system service management record # 1 , a second operating system service management record # 2 , . . . , and a second operating system service management record #n, which are records for managing the service. These second operating system service management records are as many as the number of services.
- Each of the second operating system service management records corresponds to data indicating an address where the service is written.
- the second operating system service management record # 1 of the second operating system service management record is data indicating an address where the second operating system service data # 1 is written.
- the second operating system service management record # 2 is data indicating an address where the second operating system service data # 2 is written
- the second operating system service management record #n is data indicating an address where the second operating system service data #n is written.
- the second operating system service management record # 1 is data indicating an address where the service 137 is written.
- the second operating system identification number, the authentication key for the second operating system, the second operating system file size, the second operating system memory management bit map, and the second operating system service management table, which are included in the second operating system file metadata 134 are written in a region (a second operating system file metadata region 181 shown in FIG. 13 ) prepared as a region where the second operating system file metadata 134 is written, due to the processings (the processings by the metadata writing module) in the flowchart shown in FIG. 11 .
- step S 133 in the flowchart of FIG. 10 the data, which is extracted from the command 161 and is transmitted to the metadata writing module 133 by the first operating system command analysis module 132 , corresponds to this data, and the data is written in the second operating system file metadata region 181 by the processing of the metadata writing module 133 .
- the IC card 15 is provided with the second operating system file metadata region 181 where the second operating system file metadata 134 is written and a second operating system service data region 182 where the service 137 or the service 138 is written in advance (they have been secured as reserved regions).
- This second operating system file metadata 134 includes the second operating system identification number, the authentication key for the second operating system, the second operating system file size, the second operating system memory management bit map, and the second operating system service management table, as shown in FIG. 12 .
- the service data lies in a state capable of being written. In this state, the second operating system service data region 182 is still an unused region.
- step S 182 when a service is raised to the IC card 15 , the raised service is registered with the IC card 15 .
- the second operating system service data corresponding to the service 137 is the second operating system service data # 1
- the second operating system service data # 1 is written in the second operating system service data region 182 .
- This writing may be performed by being supplied to the second operating system 131 via the first communication path 14 and the command dispatcher 102 in the same manner as the writing of the second operating system file metadata 134 .
- the second operating system file metadata 134 has been already written, and the second operating system command analysis module 135 or the second file module 136 has worked, and thus the writing may be performed by being received via the second communication path 16 .
- the second operating system memory management bit map and the second operating system service management table which have been written in the second operating system file metadata region 181 are updated, respectively, in order to correspond to the registered service.
- the file metadata is written therein, and it is thereby possible to put the IC card 15 in an available state.
- there are some steps in the raising of the event like the event concerning the registration of the service after the metadata is raised.
- the processing regarding the raising of the metadata can be performed as described above.
- the above example shows the two events such as the raising of the second operating system file metadata 134 and the raising of the service 137 .
- the raising of the second operating system file metadata 134 may be performed being divided several times, not one time.
- the event may be performed for each piece of data constituting the second operating system file metadata 134 , that is, the second operating system identification number is raised at a first time, and the authentication key for the second operating system is raised at a second time.
- Events other than the metadata may be also performed as described above. In other words, it is possible to raise any piece of data for the second operating system 131 by use of a command of a format which can be treated by the first operating system 111 .
- FIG. 14 is a diagram illustrating another configuration of the IC card 15 .
- the IC card 200 shown in FIG. 14 includes an HAL 101 , a first operating system command through API (Application Program Interface) 201 , a first operating system 111 , a first operating system command through applet 202 , an applet 112 , an applet 113 , a firewall 121 , a second operating system 131 , a first operating system command analysis module 132 , a metadata writing module 133 , a second operating system file metadata 134 , a second operating system command analysis module 135 , and a second file module 136 .
- API Application Program Interface
- the IC card 200 shown in FIG. 14 has the first operating system command through API 201 instead of the command dispatcher 102 of the IC card 15 shown in FIG. 5 .
- the first operating system 111 includes the first operating system command through applet 202 .
- the first operating system command through API 201 transmits a command, from the first operating system 111 to the second operating system 131 , or from the second operating system 131 to the first operating system 111 .
- the first operating system command through applet 202 transmits a command received via the first communication path 14 to the first operating system command through API 201 , or transmits a command from the first operating system command through API 201 to other elements via the first communication path 14 .
- the first operating system command through applet 202 supplies the received command to the first operating system command through API 201 .
- the second operating system command analysis module 135 or the second file module 136 lies in a state of working. Thereafter, for example, it is possible to add the service 137 or the service 138 to the second operating system 131 , as shown in FIG. 15 .
- the first operating system command through applet 202 receives a command via the first communication path 14 .
- the command received at this time is the command 161 shown in FIG. 9 .
- data recorded in a predetermined region in the received command is referred to so as to set a transmission destination.
- the command is set to be transmitted to the first operating system command through API 201 . This flow of the processings is made when the data which has been referred to at step S 202 indicates a command directed to the second operating system 131 .
- the first operating system command through applet 202 transmits the command 161 received via the first communication path 14 to the first operating system command through API 201 .
- the first operating system command through API 201 transmits the transmitted command 161 to the second operating system 131 .
- the command 161 is received by the first operating system command analysis module 132 of the second operating system 131 .
- data is written as the second operating system file metadata 134 by the second operating system 131 .
- a command reply indicating the writing result is output to the first operating system command through applet 202 via the first operating system command through API 201 .
- the first operating system command through applet 202 obtains the command reply at step S 205 .
- the obtained command reply is converted into a command of a format which can be treated by the first operating system 111 so as to be transmitted via the first communication path 14 . Therefore, at step S 206 , the first operating system command through applet 202 transmits the obtained command reply to the issue server 11 via the first communication path 14 .
- the first operating system command through applet 202 sets the command from the issue server 11 to be transmitted to the first operating system 111 or first operating system command through API 201 by referring to the information in the command.
- This setting is performed by the first operating system command through applet 202 , and thereby even when the command of a format which is treated by the first operating system 111 is received via the first communication path 14 , the command can be transmitted to the first operating system command through API 201 .
- This enables the following processing to be carried out in the first operating system command through API 201 or the second operating system 131 .
- the first operating system command through API 201 retransmits the transmitted command to the second operating system 131 .
- the first operating system command through API 201 retransmits the transmitted command to the first operating system 111 .
- the first operating system command analysis module 132 performs a processing based on the flowchart shown in FIG. 10 . In other words, the processing is performed in the same manner as one by the first operating system command analysis module 132 of the above-described IC card 15 . The description thereof has been already made and thus will be omitted.
- the metadata writing module 133 performs a processing based on the flowchart shown in FIG. 11 . In other words, the processing is performed in the same manner as one by the metadata writing module 133 of the above-described IC card 15 . The description thereof has been already made and thus will be omitted.
- the second operating system file metadata 134 is written, and thereby the IC card 200 lies in a state of beginning the processing in the second operating system 131 .
- the second operating system file metadata 134 is written, and thereby the second operating system command analysis module 135 or the second file module 136 can work.
- the service 137 or the service 138 is registered so as to be available after the registration, and thereby the IC card 200 lies in a state of offering the service.
- the file metadata is written therein, and it is thereby possible to put the IC card in an available state.
- the file metadata is written therein, and it is thereby possible to write the file metadata therein while maintaining security.
- a place maintaining security may be not secured in a factory in order to write the file metadata, and thereby it is possible to reduce the cost involved in the place maintaining security.
- the IC card 15 or the IC card 200 has been exemplified in the above embodiments, an IC chip, an IC card, or a mobile phone is also possible if they have the function of the IC card 15 or the IC card 200 .
- the series of the processings described above may be executed by hardware or software.
- a program constituting the software is installed in a computer.
- the computer may be a computer including dedicated hardware, or, for example, a general personal computer which can execute various functions by installing various programs.
- FIG. 17 is a block diagram illustrating a configuration example of computer hardware which can execute the above-described series of the processings by programs.
- a CPU Central Processing Unit
- ROM Read Only Memory
- RAM Random Access Memory
- An input/output interface 305 is further connected to the bus 304 .
- an input unit 306 an output unit 307 , a storage unit 308 , a communication unit 309 , and a drive 310 are connected.
- the input unit 306 includes a keyboard, a mouse, a microphone and so on.
- the output unit 307 includes a display, a speaker and so on.
- the storage unit 308 includes a hard disc, non-contact IC card-volatile memory or the like.
- the communication unit 309 includes a network interface and so on.
- the drive 310 drives removable medium 311 such as a magnetic disc, an optical disc, a magneto-optical disc, or a semiconductor memory or the like.
- the CPU 301 loads, for example, programs stored in the storage unit 308 into the RAM 303 via the input/output interface 305 and the bus 304 , for execution, to thereby perform the above-described series of the processings.
- the programs executed by the computer (CPU 301 ) can be offered by being recorded in the removable media 311 as package media or the like.
- the programs may be offered via a wire or wireless transmission medium such as a local area network, the Internet, or digital satellite broadcasting.
- the programs may be installed in the storage unit 308 via the input/output interface 305 by mounting the removable media 311 in the drive 310 .
- the programs may be received by the communication unit 309 via a wire or wireless transmission medium and then installed in the storage unit 308 .
- the programs may be installed in the ROM 302 or the storage unit 308 in advance.
- the program executed by the computer may be a program performing the processings in a time series according to the order described in this specification, or a program performing the processings in parallel or at a timing on being called and the like.
- the system means the whole apparatus constituted by a plurality of apparatuses.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
Description
- The present application claims priority to Japanese Priority Patent Application JP 2009-097581 filed in the Japan Patent Office on Apr. 14, 2009, and Japanese Priority Patent Application JP 2010-027460 filed in the Japan Patent Office on Feb. 10, 2010, the entire contents of which are hereby incorporated by reference.
- The present application relates to an information processing apparatus, method and program, and, more particularly, to an information processing apparatus, method and program suitable for use in writing file system metadata of plural operating systems.
- In recent years, a card has been disseminated which has a non-contact module capable of communicating in a non-contact manner by including an IC (integrating circuit). Such a card is called, for example, a “non-contact IC card” or the like, and is capable of communicating with other devices in a non-contact manner. The non-contact IC card is used for non-contact communication which has been adopted in, for example, transportation tickets, electronic money, ID cards, entrance-exit systems, and the like, and use of the non-contact IC card is widespread.
- Corresponding to these various uses, such a non-contact IC card is configured to have an OS (operating system) suitable for each use (Japanese Unexamined Patent Application Publication No. 2007-87120 is an example of the related art).
- Typically, file system metadata of an operating system in the non-contact IC card is written using an interface specially prepared by a chip vendor in a factory manufacturing IC cards at the time of its manufacture. The interface, prepared by the chip vendor, for writing metadata is generally not kept secure. However, the file system metadata includes security information such as a key value and the like in a section of it. Therefore, an environment for writing file system metadata is preferably a place which can maintain security.
- However, there are many chip vendors who do not have their own manufacturing equipment but entrust the manufacturing to other companies (a fabless manufacturer). As for this fabless manufacturer, it is not easy in terms of cost and the like to find a place which can maintain security.
- It is desirable to write the file system metadata of an operating system in an IC card using the IC card.
- An information processing apparatus according to an embodiment includes, a transmission means for transmitting a command for a second operating system to the second operating system when receiving the command via a communication path which communicates under a control based on a first operating system, an extraction means for extracting data for the second operating system by analyzing the command transmitted from the transmission means, and a writing means for writing the data extracted by the extraction means as data constituting file system metadata of the second operating system.
- The information processing apparatus may further include the first operating system and the second operating system.
- The information processing apparatus may constitute an IC chip, an IC card, or a mobile phone.
- The transmission means may be provided in an HAL (Hardware Abstract Layer).
- An information processing method according to an embodiment, in an information processing apparatus having a transmission means, an extraction means and a writing means, includes the steps of transmitting a command for a second operating system to the second operating system when receiving the command via a communication path which communicates under a control based on a first operating system, by the transmission means, extracting data for the second operating system by analyzing the transmitted command, by the extraction means, and writing the extracted data as data constituting file system metadata of the second operating system, by the writing means.
- A program enables a computer to execute a processing according to an embodiment, in an information processing apparatus having a transmission means, an extraction means and a writing means, the processing including the steps of transmitting a command of a second operating system to the second operating system when receiving the command via a communication path which communicates under a control based on a first operating system, by the transmission means, extracting data for the second operating system by analyzing the transmitted command, by the extraction means, and writing the extracted data as data constituting file system metadata of the second operating system, by the writing means.
- In an information processing apparatus, method and program according to an embodiment, a command for a second operating system is transmitted to the second operating system for analysis, when the command is received via a communication path which communicates under a control based on a first operating system, data for the second operating system is extracted, and the extracted data is written as data constituting file system metadata of the second operating system.
- An information processing apparatus according to another embodiment includes a supply means for supplying a command for a second operating system to a transmission means when receiving the command via a communication path which communicates under a control based on a first operating system, a transmission means for transmitting the command supplied from the supply means to the second operating system, an extraction means for extracting data for the second operating system by analyzing the command transmitted from the transmission means, and a writing means for writing the data extracted by the extraction means as data constituting file system metadata of the second operating system.
- The information processing apparatus may constitute an IC chip, an IC card, or a mobile phone.
- The supply means may be provided in the first operating system.
- The transmission means may be provided in an HAL (Hardware Abstract Layer).
- An information processing method according to another embodiment, in an information processing apparatus having a supply means, a transmission means, an extraction means and a writing means, includes the steps of supplying a command for a second operating system to a transmission means when receiving the command via a communication path which communicates under a control based on a first operating system, by the supply means, transmitting the supplied command to the second operating system, by the transmission means, extracting data for the second operating system by analyzing the transmitted command by the extraction means, and writing the extracted data as data constituting file system metadata of the second operating system, by the writing means.
- A program enables a computer to execute a processing according to another embodiment, in an information processing method of an information processing apparatus having a supply means, a transmission means, an extraction means and a writing means, the processing including the steps of supplying a command for a second operating system to a transmission means when receiving the command via a communication path which communicates under a control based on a first operating system, by the supply means, transmitting the supplied command to the second operating system, by the transmission means, extracting data for the second operating system by analyzing the transmitted command by the extraction means, and writing the extracted data as data constituting file system metadata of the second operating system, by the writing means.
- In an information processing apparatus, method and program according to another embodiment, a command for a second operating system is transmitted to the second operating system for analysis, when the command is received via a communication path which communicates under a control based on a first operating system, data for the second operating system is extracted, and the extracted data is written as data constituting file system metadata of the second operating system.
- According to an embodiment, it is possible to write predetermined data regarding an operating system of an IC card in the IC card. Also, the writing can be performed while maintaining security.
- Additional features and advantages are described herein, and will be apparent from the following Detailed Description and the figures.
-
FIG. 1 is a diagram of an information processing system according to an embodiment; -
FIG. 2 is a flowchart illustrating an operation of the information processing system; -
FIG. 3 is a diagram illustrating a configuration of another information processing system according to an embodiment; -
FIG. 4 is a flowchart illustrating another operation of the information processing system; -
FIG. 5 is a diagram illustrating a configuration of an IC card; -
FIG. 6 is a diagram illustrating a configuration of an IC card; -
FIG. 7 is a diagram illustrating a configuration of an IC card; -
FIG. 8 is a flowchart illustrating a processing by a command dispatcher; -
FIG. 9 is a diagram illustrating a command; -
FIG. 10 is a flowchart illustrating a processing by a first operating system command analysis module; -
FIG. 11 is a flowchart illustrating a processing by a metadata writing module; -
FIG. 12 is a diagram illustrating metadata; -
FIG. 13 is a diagram illustrating raising an event; -
FIG. 14 is a diagram illustrating another configuration of the IC card; -
FIG. 15 is a diagram illustrating still another configuration of the IC card; -
FIG. 16 is a flowchart illustrating a processing by a first operating system command through applet; and -
FIG. 17 is a diagram illustrating a recording medium. - The present application will be described with reference to the attached drawings according to an embodiment.
- [Configuration of System]
-
FIG. 1 is a diagram illustrating a configuration of an information processing system according to an embodiment. Aninformation processing system 10 shown inFIG. 1 has anevent server 11, anevent processing unit 12, acommunication processing unit 13, afirst communication path 14, anIC card 15, and asecond communication path 16. Theevent server 11 includes theevent processing unit 12 and thecommunication processing unit 13. - The
event server 11 communicates with theIC card 15 via thefirst communication path 14. TheIC card 15 communicates with a server (not shown) or the like via thesecond communication path 16. The first and second communication paths are communication paths used when communications are performed under controls based on different operating systems, respectively. For example, when theIC card 15 performs communication under a control based on a first operating system, the communication is carried out using thefirst communication path 14. In addition, for example, when theIC card 15 performs communication under a control based on a second operating system, the communication is carried out using thesecond communication path 16. - The first operating system and the second operating system are different from each other. As described later, the
IC card 15 may include both the first operating system and the second operating system, or may include the second operating system. However, the present application is not limited to the configuration including one or two operating systems. In other words, the present application is applicable to an IC card including a plurality of operating systems. - The first operating system is, for example, a Java Card OS, or the like. The Java Card OS as a card application can mount additional functions onto itself. In addition, herein, the first operating system is described as, for example, the Java Card OS, throughout the specification; however, it may be, for example, a MULTOS OS or a Native OS of a reader as well as the Java Card OS.
- The second operating system is, for example, a FeliCa OS or the like. The FeliCa (trademark) OS is used for a card which is employed as electronic money, and the card replaces a credit card or a prepaid card and is used in business transactions. The FeliCa OS can write a numerical value indicating electronic money in a predefined region afterwards and define a range of a region used as electronic money afterwards.
- The
event processing unit 12 of theevent server 11 generates a command for the second operating system. The generated command is supplied to thecommunication processing unit 13. Thecommunication processing unit 13 converts the supplied command into a command which can be treated by the first operating system (a command which can be analyzed by the first operating system). The command supplied from theevent processing unit 12 is transmitted to theIC card 15 via thefirst communication path 14 which communicates under the control based on the first operating system. Thecommunication processing unit 13 receives data (for example, a later-described command reply) from theIC card 15 via thefirst communication path 14. - A processing carried out by this system, principally, the
event server 11 will be described with reference to a flowchart inFIG. 2 . In addition, a configuration or an operation of theIC card 15 is described in detail. To begin with, an operation of the system is further described. - At step S11, the
event processing unit 12 of theevent server 11 generates a command directed to the second operating system. The generated command described later is a command and so on, for example, including data used by the second operating system for the event processing. The generated command is supplied to thecommunication processing unit 13. - At step S12, the
communication processing unit 13 converts the supplied command into a command of the first operating system. At step S13, thecommunication processing unit 13 transmits the converted command to theIC card 15 via thefirst communication path 14. As above, theevent server 11 converts the command of the second operating system into the command which can be treated by the first operating system, and transmits it to theIC card 15 via thefirst communication path 14 which communicates under the control based on the first operating system. - The
IC card 15 processes the received command by carrying out a processing described later and transmits a command reply including the processing result. The transmission is also performed using thefirst communication path 14. At step S14, thecommunication processing unit 13 of theevent server 11 receives the command reply from theIC card 15. Thecommunication processing unit 13 extracts predetermined data from the received command reply, and supplies the extracted data to theevent processing unit 12 as results processed by theIC card 15 alongside the processing at Steps S11 to S13. If an error occurs in the data, a processing such as retransmission of data and the like is executed. - [Another Configuration of the Information Processing System]
-
FIG. 3 is a diagram illustrating a configuration according to another embodiment. Aninformation processing system 30 shown inFIG. 3 has anevent server 11, anevent processing unit 12, acommunication processing unit 13, afirst communication path 14, anIC card 15, asecond communication path 16, and an NFC-RW 31. The elements with the same functions as those of theinformation processing system 10 shown inFIG. 1 are given the same reference numerals, and the description thereof will be appropriately omitted. - The
information processing system 30 shown inFIG. 3 has a configuration in which the NFC-RW 31 is added to theinformation processing system 10 shown inFIG. 1 . The NFC-RW 31 is provided between theevent server 11 and thefirst communication path 14. NFC stands for near field communication and RW stands for reader/writer. NFC is a communication protocol which can handle a plurality of communication formats in non-contact near wireless communication. According to the non-contact near wireless communication using this NFC, for example, a reader and a writer can perform a non-contact near wireless communication with a plurality ofnon-contact IC cards 15 corresponding to communication formats different from each other. - An operation of the
information processing system 30 is descried with reference to a flowchart inFIG. 4 . The processings at steps S31 and S32 are the same as those at steps S11 and S12 in the flowchart shown inFIG. 2 , wherein the command for the second operating system is generated and is converted into the command which can be treated by the first operating system. At step S33, thecommunication processing unit 13 transmits the command generated by theevent processing unit 12 to the NFC-RW 31. Thecommunication processing unit 13 and the NFC-RW 31 are connected to each other in a wired or a wireless manner. Also, thecommunication processing unit 13 and the NFC-RW 31 may be connected to each other via a predetermined network. - At step S34, the NFC-
RW 31 transmits the supplied command to theIC card 15 via thefirst communication path 14. This communication is performed in a non-contact manner. At step S35, thecommunication processing unit 13 receives a command reply from theIC card 15 via thefirst communication path 14 and the NFC-RW 31. - As above, the
event server 11 converts the data of the second operating system into data of a format which can be treated by the first operating system, and transmits the command to theIC card 15 via thefirst communication path 14 which communicates under the control based on the first operating system. Next, theIC card 15 receiving this command will be described. - [Configuration and Operation of the IC Card]
-
FIG. 5 is a diagram illustrating a configuration of theIC card 15. TheIC card 15 shown inFIG. 5 has an HAL (Hardware Abstraction Layer) 101, acommand dispatcher 102, afirst operating system 111, anapplet 112, anapplet 113, afirewall 121, asecond operating system 131, a first operating systemcommand analysis module 132, ametadata writing module 133, a second operatingsystem file metadata 134, a second operating systemcommand analysis module 135, and asecond file module 136. - The
HAL 101 is configured to have thecommand dispatcher 102. Thiscommand dispatcher 102 supplies (transmits) a command transmitted via thefirst communication path 14 to thefirst operating system 111 or thesecond operating system 131, by referring to predetermined data contained in the command. Especially, thecommand dispatcher 102 receives a command for thesecond operating system 131 via thefirst communication path 14 which communicates under the control based on thefirst operating system 111, and transmits the received command to thesecond operating system 131. - The
HAL 101 has a function of concealing the difference between different pieces of hardware. For example, even when using different pieces of hardware, an operating system can have access to each of the different pieces of hardware via the same interface. The use of theHAL 101 with such a function enables the hardware and the HAL to be changed without changing the mounting of the operating system, and therefore the operating system can use the same function. - In this embodiment, the use of the
HAL 101 allows thecommand dispatcher 102 to be used even when an algorithm is changed in transmitting and receiving data, for example, via thefirst communication path 14, and thus the data can be transmitted and received using the same algorithm although thecommand dispatcher 102 is any type of interface. That is to say, an event algorithm described below can be applied by adopting theHAL 101, regardless of the type ofcommand dispatcher 102. - The
first operating system 111 includes theapplet 112 and theapplet 113. As described above, thefirst operating system 111 is, for example, the Java Card OS, and theapplet 112 and theapplet 113 are programs run by the Java Card OS. Thefirst operating system 111 and thesecond operating system 131 are configured to have no access to each other. In order to have no access to each other, thefirewall 121 is provided between thefirst operating system 111 and thesecond operating system 131. - The
second operating system 131 includes the first operating systemcommand analysis module 132, themetadata writing module 133, the second operatingsystem file metadata 134, the second operating systemcommand analysis module 135, and thesecond file module 136. - The first operating system
command analysis module 132 analyzes a command supplied from thecommand dispatcher 102 and extracts predetermined data for thesecond operating system 131 therefrom. The command supplied to the first operating systemcommand analysis module 132 is converted into a format which can be treated by thefirst operating system 111, although it is a command for thesecond operating system 131. In addition, the command supplied to the first operating systemcommand analysis module 132 is a command undertaking communication in a state where security is maintained, by using a function concerning encrypted communication of thefirst operating system 111. - Therefore, the first operating system
command analysis module 132 is included in thesecond operating system 131; however, it has a function of analyzing the command for thefirst operating system 111, or of decrypting the command to which the encryption function of thefirst operating system 111 has been applied. - The data from the first operating system
command analysis module 132 is supplied to themetadata writing module 133. Themetadata writing module 133 writes the data from the first operating systemcommand analysis module 132 in the second operatingsystem file metadata 134. In other words, as a result analyzed by the first operating systemcommand analysis module 132, the extracted data is data constituting the second operatingsystem file metadata 134. Themetadata writing module 133 writes such data. - The frame of the second operating
system file metadata 134 shown inFIG. 5 is marked with dotted lines. This indicates that the second operatingsystem file metadata 134 works only after the metadata is written in the second operatingsystem file metadata 134 by themetadata writing module 133. In addition, the second operating systemcommand analysis module 135 and thesecond file module 136 also work only after the metadata is written in the second operatingsystem file metadata 134, and thus the frame thereof is marked with dotted lines as well inFIG. 5 . - The second operating system
command analysis module 135 obtains and analyzes a command for thesecond operating system 131 supplied via thesecond communication path 16. The analysis result is supplied to thesecond file module 136. Thesecond file module 136 carries out a processing based on the analysis result from the second operating systemcommand analysis module 135. - For example, it is possible to include additional services in the
second operating system 131, as shown inFIG. 6 . Theservice 137 or theservice 138 is added after the metadata is written in the second operatingsystem file metadata 134, and thereby the second operatingsystem file metadata 134, the second operating systemcommand analysis module 135 and thesecond file module 136 work, respectively. - If the
second operating system 131 is assumed as the FeliCa (trademark) OS, which is used as a card for use as electronic money, the card replaces a credit card or a prepaid card and is used in business transactions. Theservice 137 or theservice 138 is for offering a credit card service or a prepaid card service. Thesecond file module 136 controls theservice 137 or theservice 138 on the basis of the data from the second operating systemcommand analysis module 135. - The first operating system
command analysis module 132, themetadata writing module 133, the second operating systemcommand analysis module 135, and thesecond file module 136 are stored in, for example, a read only memory such as a ROM (Read Only Memory) or the like. The second operatingsystem file metadata 134, theservice 137 and theservice 138 are stored in a non-volatile memory, for example, an EEPROM (Erasable Programmable ROM) or the like. - A processing for writing the second operating
system file metadata 134 will be described below. The processing for writing the second operatingsystem file metadata 134 is carried out by thesecond operating system 131, and therefore thefirst operating system 111 may not be included in theIC card 15. That is to say, theIC card 15 may have a configuration as shown inFIG. 7 . - The
IC card 15 shown inFIG. 7 has a configuration in which thefirst operating system 111 and thefirewall 121 are removed from theIC card 15 shown inFIG. 5 . Even this configuration can perform the processing for writing the second operatingsystem file metadata 134 described below. - Next, the processing performed by the
IC card 15 shown inFIG. 5 orFIG. 7 will be described. To begin with, a processing performed by thecommand dispatcher 102 will be described with reference to a flowchart inFIG. 8 . - At step S101, the
command dispatcher 102 receives a command via thefirst communication path 14. At step S102, thecommand dispatcher 102 determines a transmission destination with reference to data (identifier and so on) recorded in a predetermined region in the received command. At step S103, the command is set to be transmitted to thesecond operating system 131. This flow of the processings is carried out when the data which has been referred to at step S102 indicates a command directed to thesecond operating system 131. - Here, the received command, in this flow of the processings, that is, when the
command dispatcher 102 sets the received command to be transmitted to thesecond operating system 131, will be described. The received command in this flow of the processings is a command referred to as a Select command. The Select command is used in selecting files, and so on. - A
command 161 shown inFIG. 9 has aCLA region 171, anINS region 172, aP1 region 173, aP2 region 174, anLC region 175, aDATA region 176, and anLE region 177. An instruction class is written in theCLA region 171, an instruction code is written in theINS region 172, aninstruction parameter 1 is written in theP1 region 173, and aninstruction parameter 2 is written in theP2 region 174. The number of bytes of theDATA region 176 in thecommand 161 is written in theLC region 175, command data is written in theDATA region 176, and the maximum number of bytes expected in a data field of a response to the command is written in theLE region 177. - If the
command 161 is the Select command, “A4”, which is an identifier indicating that this command is the Select command, is written in theINS region 172. Thecommand dispatcher 102 recognizes the Select command when the “A4” is written in theINS region 172 of the receivedcommand 161. Next, theDATA region 176 is referred to. In theDATA region 176, “AID” is written. This “AID” stands for Association Identifier and is information indicating an operating system of a destination. For example, the AID is given as follows. AID=“A0 00 00 03 17 01 XX XX XX XX.” Here, “XX XX XX XX” indicates what is undefined. - When AID=“A0 00 00 03 17 01 XX XX XX XX,” the operating system of the destination is assumed as the
second operating system 131. Thecommand dispatcher 102 sets a destination to thesecond operating system 131, at step S102, when the “A4” is written in theINS region 172 of the receivedcommand 161 and AID=“A0 00 00 03 17 01 XX XX XX XX” is written in theDATA region 176, and sets a command received since this time to be transmitted to thesecond operating system 131. This setting is maintained until a command reply is obtained from the first operating systemcommand analysis module 132. - Though detailed description is omitted, when codes other than the “A4” are written in the
INS region 172 of thecommand 161 or data other than the AID is written in theDATA region 176 thereof, a processing corresponding to the code or the data is carried out. - The
command dispatcher 102 receives the Select command, and thereafter there is a possibility that it receives commands frequently. Thecommand dispatcher 102 receives the Select command and sets commands received since then to be transmitted to thesecond operating system 131, and thereby the commands received since then are transmitted to thesecond operating system 131. In a command transmitted like this, data constituting the second operatingsystem file metadata 134 is written in the DATA region 176 (which will be described in detail with reference toFIGS. 12 and 13 ), although not shown. - Referring to the flowchart in
FIG. 8 again, at step S104, thecommand dispatcher 102 transmits thecommand 161 received via thefirst communication path 14 to thesecond operating system 131. Thesecond operating system 131 receives thecommand 161 from thecommand dispatcher 102 by the first operating systemcommand analysis module 132. Thereafter, a processing described later is carried out in thesecond operating system 131, and a command reply indicating the processing result is output to thecommand dispatcher 102 from thesecond operating system 131. - The
command dispatcher 102 obtains the command reply at step S105. The obtained command reply has been converted into a format which can be treated by thefirst operating system 111. Thecommand dispatcher 102, at step S106, transmits the obtained command reply to theevent server 11 via thefirst communication path 14. As for the command received via thefirst communication path 14 at the time of obtaining the command reply, the setting of transmission to thesecond operating system 131 is canceled. - As above, the
command dispatcher 102 receives the command from theevent server 11, and sets the obtained command to be transmitted to thefirst operating system 111 or thesecond operating system 131 by referring to the information contained in the command. This setting is performed by thecommand dispatcher 102, and thereby even when the command of a format which is treated by thefirst operating system 111 is received via thefirst communication path 14, the command can be transmitted to thesecond operating system 131. This enables the following processing to be carried out in thesecond operating system 131. - A processing carried out by the first operating system
command analysis module 132 of thesecond operating system 131 will be described with reference to a flowchart inFIG. 10 . - At step S131, the first operating system
command analysis module 132 obtains a command from thecommand dispatcher 102. This processing is performed when thecommand dispatcher 102 performs the processing at step S104 (FIG. 8 ). The first operating systemcommand analysis module 132 analyzes the obtained command at step S132. It extracts data from thecommand 161 by the use of the analysis result at step S133. The extracted data is data to be written as the second operatingsystem file metadata 134 and is described later with reference toFIG. 12 orFIG. 13 . The extracted data is supplied to themetadata writing module 133. - The first operating system
command analysis module 132 is included in thesecond operating system 131; however it has a function of analyzing the command for thefirst operating system 111 in order to extract the data for thesecond operating system 131. Thus, the first operating systemcommand analysis module 132 can process the command of the format which is supplied from thecommand dispatcher 102 and is treated by thefirst operating system 111. - These processings such as the obtaining of the command, the extraction and transmission of the data may be repeated several times. If data is transmitted several times, the first operating system
command analysis module 132 obtains a command reply from themetadata writing module 133 at step S134. The first operating systemcommand analysis module 132 converts the received command reply into the command reply of a format which can be treated by thefirst operating system 111 at step S135. - At step S136, the first operating system
command analysis module 132 supplies the command reply converted into a command reply for thefirst operating system 111, to thecommand dispatcher 102. Corresponding to this processing, thecommand dispatcher 102 carries out the processing at step S105 (FIG. 8 ). - As above, the first operating system
command analysis module 132 extracts the data for thesecond operating system 131 from the command of the format which can be treated by thefirst operating system 111. The first operating systemcommand analysis module 132 also converts the data for thesecond operating system 131 into the command of the format which can be treated by thefirst operating system 111. The first operating systemcommand analysis module 132 performs these processings, and thereby thesecond operating system 131 can process the command of the format which can be treated by thefirst operating system 111. - Subsequently, a processing by the
metadata writing module 133 which receives data supplied from the first operating systemcommand analysis module 132 or which supplies a command reply to the first operating systemcommand analysis module 132 will be described with reference to a flowchart inFIG. 11 . - At step S161, the
metadata writing module 133 obtains data from the first operating systemcommand analysis module 132. This processing is performed when the first operating systemcommand analysis module 132 performs the processing at step S133 (FIG. 10 ). At step S162, themetadata writing module 133 writes the obtained data as the second operatingsystem file metadata 134. For example, the data is sequentially written in the second operating system file metadata region 181 (FIG. 13 ) which has been secured in the memory. - At step S163, it is determined whether or not the writing of the data is completed. The
metadata writing module 133 determines the writing of the data is completed when the data is normally written as the second operatingsystem file metadata 134 or when an error occurs for a certain reason. At step S163, the processing returns to step S161 until the writing of the data is determined to be completed, and thus the processing since then is repeated so that the writing of data is continuously performed. - On the other hand, at step S163, if the writing of the data is determined to be completed, the processing at step S164 is performed. At step S164, the
metadata writing module 133 generates a command reply for output to the first operating systemcommand analysis module 132. At this time, when the writing is normally completed, a command reply indicating that the writing is normally completed is generated, and when the writing is completed due to occurrence of any errors, a command reply indicating the occurrence of errors is generated. - The command reply output from the
metadata writing module 133 is received by the first operating systemcommand analysis module 132 as the processing at step S134 (FIG. 10 ). - In this way, the second operating
system file metadata 134 is written, and thereby theIC card 15 lies in a state of beginning the processing in thesecond operating system 131. As described above, the second operatingsystem file metadata 134 is written, and thereby the second operating systemcommand analysis module 135 or thesecond file module 136 can work. In addition, theservice 137 or theservice 138 is registered so as to be available after the registration, and thereby theIC card 15 lies in a state of offering the service. - The second operating
system file metadata 134 written by this processing will be further described.FIG. 12 is a diagram illustrating a relation between a configuration of the second operatingsystem file metadata 134 and service data of the service 137 (138). - The second operating
system file metadata 134 includes a second operating system identification number for identifying thesecond operating system 131, an authentication key for the second operating system which is used for communicating with other devices via the second communication path 16 (FIG. 6 ), and a second operating system file size indicating a file size. In addition, the second operatingsystem file metadata 134 includes a second operating system memory management bit map which is address information of data constituting the second operatingsystem file metadata 134, and a second operating system service management table which is a table for managing, for example, theservice 137 or the service 138 (FIG. 6 ), which runs on the second operatingsystem file metadata 134. - The second operating system service management table includes a second operating system service
management record # 1, a second operating system servicemanagement record # 2, . . . , and a second operating system service management record #n, which are records for managing the service. These second operating system service management records are as many as the number of services. - Each of the second operating system service management records corresponds to data indicating an address where the service is written. When there is a possibility that a second operating system
service data # 1, a second operating systemservice data # 2, . . . , and a second operating system service data #n are recorded as service data, the second operating system servicemanagement record # 1 of the second operating system service management record is data indicating an address where the second operating systemservice data # 1 is written. In addition, the second operating system servicemanagement record # 2 is data indicating an address where the second operating systemservice data # 2 is written, and the second operating system service management record #n is data indicating an address where the second operating system service data #n is written. - For example, if the second operating system
service data # 1 is theservice 137, the second operating system servicemanagement record # 1 is data indicating an address where theservice 137 is written. - The second operating system identification number, the authentication key for the second operating system, the second operating system file size, the second operating system memory management bit map, and the second operating system service management table, which are included in the second operating
system file metadata 134, are written in a region (a second operating systemfile metadata region 181 shown inFIG. 13 ) prepared as a region where the second operatingsystem file metadata 134 is written, due to the processings (the processings by the metadata writing module) in the flowchart shown inFIG. 11 . - In addition, at step S133 in the flowchart of
FIG. 10 , the data, which is extracted from thecommand 161 and is transmitted to themetadata writing module 133 by the first operating systemcommand analysis module 132, corresponds to this data, and the data is written in the second operating systemfile metadata region 181 by the processing of themetadata writing module 133. - This will be further described with reference to
FIG. 13 . TheIC card 15 is provided with the second operating systemfile metadata region 181 where the second operatingsystem file metadata 134 is written and a second operating systemservice data region 182 where theservice 137 or theservice 138 is written in advance (they have been secured as reserved regions). - The above-described processing at step S181, that is, the processing is performed by the
metadata writing module 133, and when the second operatingsystem file metadata 134 is thus raised, the second operatingsystem file metadata 134 is written in the second operating systemfile metadata region 181. This second operatingsystem file metadata 134 includes the second operating system identification number, the authentication key for the second operating system, the second operating system file size, the second operating system memory management bit map, and the second operating system service management table, as shown inFIG. 12 . - In this way, when the second operating
system file metadata 134 is raised to theIC card 15 and the second operatingsystem file metadata 134 is written in the second operating systemfile metadata region 181, the service data lies in a state capable of being written. In this state, the second operating systemservice data region 182 is still an unused region. - At step S182, when a service is raised to the
IC card 15, the raised service is registered with theIC card 15. For example, when theservice 137 is raised and the second operating system service data corresponding to theservice 137 is the second operating systemservice data # 1, the second operating systemservice data # 1 is written in the second operating systemservice data region 182. - This writing may be performed by being supplied to the
second operating system 131 via thefirst communication path 14 and thecommand dispatcher 102 in the same manner as the writing of the second operatingsystem file metadata 134. Alternatively, the second operatingsystem file metadata 134 has been already written, and the second operating systemcommand analysis module 135 or thesecond file module 136 has worked, and thus the writing may be performed by being received via thesecond communication path 16. - When the second operating system
service data # 1 is written (registered), the second operating system memory management bit map and the second operating system service management table which have been written in the second operating systemfile metadata region 181 are updated, respectively, in order to correspond to the registered service. - In this way, with respect to the
IC card 15 in which the file metadata is not written, the file metadata is written therein, and it is thereby possible to put theIC card 15 in an available state. In addition, as described above, there are some steps in the raising of the event like the event concerning the registration of the service after the metadata is raised. The processing regarding the raising of the metadata can be performed as described above. - In other words, the above example shows the two events such as the raising of the second operating
system file metadata 134 and the raising of theservice 137. In addition, for example, the raising of the second operatingsystem file metadata 134 may be performed being divided several times, not one time. For example, the event may be performed for each piece of data constituting the second operatingsystem file metadata 134, that is, the second operating system identification number is raised at a first time, and the authentication key for the second operating system is raised at a second time. - Events other than the metadata (e.g., the service) may be also performed as described above. In other words, it is possible to raise any piece of data for the
second operating system 131 by use of a command of a format which can be treated by thefirst operating system 111. - [Another Configuration and Operation of the IC Card]
-
FIG. 14 is a diagram illustrating another configuration of theIC card 15. TheIC card 200 shown inFIG. 14 includes anHAL 101, a first operating system command through API (Application Program Interface) 201, afirst operating system 111, a first operating system command throughapplet 202, anapplet 112, anapplet 113, afirewall 121, asecond operating system 131, a first operating systemcommand analysis module 132, ametadata writing module 133, a second operatingsystem file metadata 134, a second operating systemcommand analysis module 135, and asecond file module 136. - In the
IC card 200 shown inFIG. 14 , elements with the same function as those of theIC card 15 shown inFIG. 5 are given the same reference numerals, and the description thereof will be omitted. TheIC card 200 shown inFIG. 14 has the first operating system command throughAPI 201 instead of thecommand dispatcher 102 of theIC card 15 shown inFIG. 5 . In addition, thefirst operating system 111 includes the first operating system command throughapplet 202. - The first operating system command through
API 201 transmits a command, from thefirst operating system 111 to thesecond operating system 131, or from thesecond operating system 131 to thefirst operating system 111. - The first operating system command through
applet 202 transmits a command received via thefirst communication path 14 to the first operating system command throughAPI 201, or transmits a command from the first operating system command throughAPI 201 to other elements via thefirst communication path 14. Principally, when receiving a command of thesecond operating system 131 via thefirst communication path 14 which communicates under the control based on thefirst operating system 111, the first operating system command throughapplet 202 supplies the received command to the first operating system command throughAPI 201. - Also, in the
IC card 200 shown inFIG. 14 in the same manner as theIC card 15 shown inFIG. 5 , when the second operatingsystem file metadata 134 is written, the second operating systemcommand analysis module 135 or thesecond file module 136 lies in a state of working. Thereafter, for example, it is possible to add theservice 137 or theservice 138 to thesecond operating system 131, as shown inFIG. 15 . - Next, a processing by the first operating system command through
applet 202 will be described with reference toFIG. 16 . - At step S201, the first operating system command through
applet 202 receives a command via thefirst communication path 14. The command received at this time is thecommand 161 shown inFIG. 9 . At step S202, data recorded in a predetermined region in the received command is referred to so as to set a transmission destination. At step S203, the command is set to be transmitted to the first operating system command throughAPI 201. This flow of the processings is made when the data which has been referred to at step S202 indicates a command directed to thesecond operating system 131. - At step S204, the first operating system command through
applet 202 transmits thecommand 161 received via thefirst communication path 14 to the first operating system command throughAPI 201. The first operating system command throughAPI 201 transmits the transmittedcommand 161 to thesecond operating system 131. Thecommand 161 is received by the first operating systemcommand analysis module 132 of thesecond operating system 131. Thereafter, data is written as the second operatingsystem file metadata 134 by thesecond operating system 131. A command reply indicating the writing result is output to the first operating system command throughapplet 202 via the first operating system command throughAPI 201. - The first operating system command through
applet 202 obtains the command reply at step S205. The obtained command reply is converted into a command of a format which can be treated by thefirst operating system 111 so as to be transmitted via thefirst communication path 14. Therefore, at step S206, the first operating system command throughapplet 202 transmits the obtained command reply to theissue server 11 via thefirst communication path 14. - As above, the first operating system command through
applet 202 sets the command from theissue server 11 to be transmitted to thefirst operating system 111 or first operating system command throughAPI 201 by referring to the information in the command. This setting is performed by the first operating system command throughapplet 202, and thereby even when the command of a format which is treated by thefirst operating system 111 is received via thefirst communication path 14, the command can be transmitted to the first operating system command throughAPI 201. This enables the following processing to be carried out in the first operating system command throughAPI 201 or thesecond operating system 131. - When the command is transmitted from the first operating system command through
applet 202, the first operating system command throughAPI 201 retransmits the transmitted command to thesecond operating system 131. In addition, when the command is transmitted from thesecond operating system 131, the first operating system command throughAPI 201 retransmits the transmitted command to thefirst operating system 111. - The first operating system
command analysis module 132 performs a processing based on the flowchart shown inFIG. 10 . In other words, the processing is performed in the same manner as one by the first operating systemcommand analysis module 132 of the above-describedIC card 15. The description thereof has been already made and thus will be omitted. - The
metadata writing module 133 performs a processing based on the flowchart shown inFIG. 11 . In other words, the processing is performed in the same manner as one by themetadata writing module 133 of the above-describedIC card 15. The description thereof has been already made and thus will be omitted. - In this way, the second operating
system file metadata 134 is written, and thereby theIC card 200 lies in a state of beginning the processing in thesecond operating system 131. As described above, the second operatingsystem file metadata 134 is written, and thereby the second operating systemcommand analysis module 135 or thesecond file module 136 can work. In addition, theservice 137 or theservice 138 is registered so as to be available after the registration, and thereby theIC card 200 lies in a state of offering the service. - In this way, with respect to the
IC card 200 in which the file metadata is not written, the file metadata is written therein, and it is thereby possible to put the IC card in an available state. - As above, with respect to the
IC card 15 or theIC card 200 in which the file metadata is not written, the file metadata is written therein, and it is thereby possible to write the file metadata therein while maintaining security. Thus, a place maintaining security may be not secured in a factory in order to write the file metadata, and thereby it is possible to reduce the cost involved in the place maintaining security. - Although the
IC card 15 or theIC card 200 has been exemplified in the above embodiments, an IC chip, an IC card, or a mobile phone is also possible if they have the function of theIC card 15 or theIC card 200. - [Recording Medium]
- The series of the processings described above may be executed by hardware or software. When the series of the processings is executed by software, a program constituting the software is installed in a computer. Here, the computer may be a computer including dedicated hardware, or, for example, a general personal computer which can execute various functions by installing various programs.
-
FIG. 17 is a block diagram illustrating a configuration example of computer hardware which can execute the above-described series of the processings by programs. - In the computer, a CPU (Central Processing Unit) 301, an ROM (Read Only Memory) 302, and an RAM (Random Access Memory) 303 are connected to each other via a
bus 304. An input/output interface 305 is further connected to thebus 304. To the input/output interface 305, aninput unit 306, anoutput unit 307, astorage unit 308, acommunication unit 309, and adrive 310 are connected. - The
input unit 306 includes a keyboard, a mouse, a microphone and so on. Theoutput unit 307 includes a display, a speaker and so on. Thestorage unit 308 includes a hard disc, non-contact IC card-volatile memory or the like. Thecommunication unit 309 includes a network interface and so on. Thedrive 310 drives removable medium 311 such as a magnetic disc, an optical disc, a magneto-optical disc, or a semiconductor memory or the like. - In the computer having the configuration described above, the
CPU 301 loads, for example, programs stored in thestorage unit 308 into theRAM 303 via the input/output interface 305 and thebus 304, for execution, to thereby perform the above-described series of the processings. - The programs executed by the computer (CPU 301) can be offered by being recorded in the
removable media 311 as package media or the like. In addition, the programs may be offered via a wire or wireless transmission medium such as a local area network, the Internet, or digital satellite broadcasting. - In the computer, the programs may be installed in the
storage unit 308 via the input/output interface 305 by mounting theremovable media 311 in thedrive 310. In addition, the programs may be received by thecommunication unit 309 via a wire or wireless transmission medium and then installed in thestorage unit 308. The programs may be installed in theROM 302 or thestorage unit 308 in advance. - The program executed by the computer may be a program performing the processings in a time series according to the order described in this specification, or a program performing the processings in parallel or at a timing on being called and the like.
- In this specification, the system means the whole apparatus constituted by a plurality of apparatuses.
- It should be understood that various changes and modifications to the presently preferred embodiments described herein will be apparent to those skilled in the art. Such changes and modifications can be made without departing from the spirit and scope and without diminishing its intended advantages. It is therefore intended that such changes and modifications be covered by the appended claims.
Claims (14)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009097581 | 2009-04-14 | ||
JPP2009-097581 | 2009-04-14 | ||
JPP2010-027460 | 2010-02-10 | ||
JP2010027460A JP5549854B2 (en) | 2009-04-14 | 2010-02-10 | Information processing apparatus and method, and program |
JP2010-027460 | 2010-02-10 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100262672A1 true US20100262672A1 (en) | 2010-10-14 |
US9037687B2 US9037687B2 (en) | 2015-05-19 |
Family
ID=42537550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/752,385 Expired - Fee Related US9037687B2 (en) | 2009-04-14 | 2010-04-01 | Information processing apparatus, method and program for writing file system metadata of plural operating systems |
Country Status (4)
Country | Link |
---|---|
US (1) | US9037687B2 (en) |
EP (1) | EP2242030A3 (en) |
JP (1) | JP5549854B2 (en) |
CN (1) | CN101866434B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8959533B2 (en) * | 2012-10-10 | 2015-02-17 | Lenovo (Singapore) Pte. Ltd. | Communicating between a first operating environment and a second operating environment in an operating system |
US20150324201A1 (en) * | 2014-05-08 | 2015-11-12 | Fuji Xerox Co., Ltd. | Information processing apparatus and non-transitory computer readable medium |
US20160004547A1 (en) * | 2012-01-17 | 2016-01-07 | C/O Sony Corporation | Apparatus, method, program and system for processing information utilizing a multi-platform capable of managing a plurality of applications |
US20160198477A1 (en) * | 2013-09-11 | 2016-07-07 | Panasonic Intellectual Property Management Co., Ltd. | Communications device and communications system |
US11403155B2 (en) * | 2020-03-17 | 2022-08-02 | Google Llc | Integration of vehicle manufacturer user management system with automotive operating system |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5813445B2 (en) * | 2011-09-30 | 2015-11-17 | 株式会社東芝 | IC card, communication system, and communication method |
JP6515850B2 (en) * | 2012-01-17 | 2019-05-22 | ソニー株式会社 | INFORMATION PROCESSING APPARATUS, IC CHIP, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM |
CN104536823B (en) * | 2015-01-16 | 2018-08-24 | 宇龙计算机通信科技(深圳)有限公司 | Shortcut operation method, prompt operation device and terminal |
JP6876235B2 (en) * | 2016-09-27 | 2021-05-26 | 富士フイルムビジネスイノベーション株式会社 | Electronic equipment and image processing equipment |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4530052A (en) * | 1982-10-14 | 1985-07-16 | Honeywell Information Systems Inc. | Apparatus and method for a data processing unit sharing a plurality of operating systems |
US5365045A (en) * | 1990-06-07 | 1994-11-15 | Kabushiki Kaisha Toshiba | Portable electric device |
US20020104017A1 (en) * | 2001-01-30 | 2002-08-01 | Rares Stefan | Firewall system for protecting network elements connected to a public network |
US20030110344A1 (en) * | 1996-09-18 | 2003-06-12 | Andre Szczepanek | Communications systems, apparatus and methods |
US20040231148A1 (en) * | 2001-09-28 | 2004-11-25 | Walter Andersch | Head for implanting electrical components on substrates |
US20050144436A1 (en) * | 2003-12-24 | 2005-06-30 | Institute For Information Industry | Multitasking system level platform for HW/SW co-verification |
US20050235278A1 (en) * | 2004-04-16 | 2005-10-20 | Tung-Peng Wu | Computer system with two operating system for automatically downloading updated information and method thereof |
US6994263B2 (en) * | 2002-06-28 | 2006-02-07 | Matsushita Electric Industrial Co., Ltd. | IC card |
US20060270397A1 (en) * | 2005-05-25 | 2006-11-30 | Felica Networks, Inc. | Contactless IC chip, portable terminal, information processing method, and program |
US20070124796A1 (en) * | 2004-11-25 | 2007-05-31 | Erland Wittkotter | Appliance and method for client-sided requesting and receiving of information |
US20070180454A1 (en) * | 2006-01-17 | 2007-08-02 | Ntt Docomo, Inc. | Input/output control apparatus, input/output control system, and input/output control method |
US20080127088A1 (en) * | 2006-11-27 | 2008-05-29 | Red Hat, Inc. | Cross-platform software package generation |
US20080151767A1 (en) * | 2006-12-22 | 2008-06-26 | Verizon Data Services Inc. | Network element connection management within a network management system |
US20080306872A1 (en) * | 2000-07-06 | 2008-12-11 | David Paul Felsher | Information record infrastructure, system and method |
US20100017613A1 (en) * | 2006-12-26 | 2010-01-21 | Beijing Watch Data System Co., Ltd. | Dual usage smart card of cpu and logical encryption and its data synchronization method |
US20100124227A1 (en) * | 2008-11-19 | 2010-05-20 | General Electric Company | Systems and methods for electronically routing data |
US20100165215A1 (en) * | 2008-12-31 | 2010-07-01 | Youngtack Shim | Communication control systems and methods |
US8230233B2 (en) * | 2006-06-05 | 2012-07-24 | Felica Networks, Inc. | Information processing terminal and program for use therewith |
US8271996B1 (en) * | 2008-09-29 | 2012-09-18 | Emc Corporation | Event queues |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4309068B2 (en) * | 2001-01-11 | 2009-08-05 | 株式会社日立製作所 | Card data processing device |
JP3636989B2 (en) * | 2001-03-02 | 2005-04-06 | 株式会社ジェーシービー | Data processing apparatus, integrated circuit, IC card, data processing method, and data processing program |
KR100560768B1 (en) * | 2003-09-05 | 2006-03-13 | 삼성전자주식회사 | Dual interface integrated circuit card |
JP4590201B2 (en) * | 2004-04-01 | 2010-12-01 | 大日本印刷株式会社 | Data carrier and data carrier program |
JP4763332B2 (en) * | 2004-09-03 | 2011-08-31 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile terminal device, contactless card function management system, and contactless card function acquisition system |
EP1686468A1 (en) * | 2005-01-26 | 2006-08-02 | Intervideo Inc | Computer architecture with multiple operating systems using a common disc partition |
JP2007087120A (en) * | 2005-09-22 | 2007-04-05 | Dainippon Printing Co Ltd | Ic card mounted with multiple os (operating system) and issue consignment method |
CN100504921C (en) * | 2006-06-29 | 2009-06-24 | 北京握奇数据系统有限公司 | Smart card operating system and method thereof |
JP2008152411A (en) * | 2006-12-15 | 2008-07-03 | Sony Corp | Information processor, information processing method and program |
US8312476B2 (en) * | 2007-09-05 | 2012-11-13 | Htc Corporation | Method for synchronizing information of dual operating systems |
JP2009097581A (en) | 2007-10-15 | 2009-05-07 | Toyota Motor Corp | Shift device |
JP5249660B2 (en) | 2008-07-22 | 2013-07-31 | 積水化学工業株式会社 | Glass paste composition and method for producing plasma display panel |
-
2010
- 2010-02-10 JP JP2010027460A patent/JP5549854B2/en active Active
- 2010-03-12 EP EP10002643A patent/EP2242030A3/en not_active Ceased
- 2010-04-01 US US12/752,385 patent/US9037687B2/en not_active Expired - Fee Related
- 2010-04-07 CN CN201010151250.7A patent/CN101866434B/en not_active Expired - Fee Related
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4530052A (en) * | 1982-10-14 | 1985-07-16 | Honeywell Information Systems Inc. | Apparatus and method for a data processing unit sharing a plurality of operating systems |
US5365045A (en) * | 1990-06-07 | 1994-11-15 | Kabushiki Kaisha Toshiba | Portable electric device |
US20030110344A1 (en) * | 1996-09-18 | 2003-06-12 | Andre Szczepanek | Communications systems, apparatus and methods |
US20080306872A1 (en) * | 2000-07-06 | 2008-12-11 | David Paul Felsher | Information record infrastructure, system and method |
US20020104017A1 (en) * | 2001-01-30 | 2002-08-01 | Rares Stefan | Firewall system for protecting network elements connected to a public network |
US20040231148A1 (en) * | 2001-09-28 | 2004-11-25 | Walter Andersch | Head for implanting electrical components on substrates |
US6994263B2 (en) * | 2002-06-28 | 2006-02-07 | Matsushita Electric Industrial Co., Ltd. | IC card |
US20050144436A1 (en) * | 2003-12-24 | 2005-06-30 | Institute For Information Industry | Multitasking system level platform for HW/SW co-verification |
US20050235278A1 (en) * | 2004-04-16 | 2005-10-20 | Tung-Peng Wu | Computer system with two operating system for automatically downloading updated information and method thereof |
US20070124796A1 (en) * | 2004-11-25 | 2007-05-31 | Erland Wittkotter | Appliance and method for client-sided requesting and receiving of information |
US20060270397A1 (en) * | 2005-05-25 | 2006-11-30 | Felica Networks, Inc. | Contactless IC chip, portable terminal, information processing method, and program |
US20070180454A1 (en) * | 2006-01-17 | 2007-08-02 | Ntt Docomo, Inc. | Input/output control apparatus, input/output control system, and input/output control method |
US8230233B2 (en) * | 2006-06-05 | 2012-07-24 | Felica Networks, Inc. | Information processing terminal and program for use therewith |
US20080127088A1 (en) * | 2006-11-27 | 2008-05-29 | Red Hat, Inc. | Cross-platform software package generation |
US20080151767A1 (en) * | 2006-12-22 | 2008-06-26 | Verizon Data Services Inc. | Network element connection management within a network management system |
US20100017613A1 (en) * | 2006-12-26 | 2010-01-21 | Beijing Watch Data System Co., Ltd. | Dual usage smart card of cpu and logical encryption and its data synchronization method |
US8271996B1 (en) * | 2008-09-29 | 2012-09-18 | Emc Corporation | Event queues |
US20100124227A1 (en) * | 2008-11-19 | 2010-05-20 | General Electric Company | Systems and methods for electronically routing data |
US20100165215A1 (en) * | 2008-12-31 | 2010-07-01 | Youngtack Shim | Communication control systems and methods |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160004547A1 (en) * | 2012-01-17 | 2016-01-07 | C/O Sony Corporation | Apparatus, method, program and system for processing information utilizing a multi-platform capable of managing a plurality of applications |
US9946558B2 (en) * | 2012-01-17 | 2018-04-17 | Sony Corporation | Apparatus, method and system for activating an operating system based on a unified command |
US10599448B2 (en) | 2012-01-17 | 2020-03-24 | Sony Corporation | Information processing apparatus, IC chip, information processing method, and information processing system |
US11119791B2 (en) | 2012-01-17 | 2021-09-14 | Sony Corporation | Information processing apparatus, IC chip, information processing method, program, and information processing system |
US8959533B2 (en) * | 2012-10-10 | 2015-02-17 | Lenovo (Singapore) Pte. Ltd. | Communicating between a first operating environment and a second operating environment in an operating system |
US20160198477A1 (en) * | 2013-09-11 | 2016-07-07 | Panasonic Intellectual Property Management Co., Ltd. | Communications device and communications system |
US10085268B2 (en) * | 2013-09-11 | 2018-09-25 | Panasonic Intellectual Property Management Co., Ltd. | Communications device and communications system |
US20150324201A1 (en) * | 2014-05-08 | 2015-11-12 | Fuji Xerox Co., Ltd. | Information processing apparatus and non-transitory computer readable medium |
US9753728B2 (en) * | 2014-05-08 | 2017-09-05 | Fuji Xerox Co., Ltd. | Apparatus and medium for converting a persistent wait instruction to an instruction for periodically waiting for a control target |
US11403155B2 (en) * | 2020-03-17 | 2022-08-02 | Google Llc | Integration of vehicle manufacturer user management system with automotive operating system |
Also Published As
Publication number | Publication date |
---|---|
JP2010267248A (en) | 2010-11-25 |
CN101866434A (en) | 2010-10-20 |
EP2242030A3 (en) | 2011-08-17 |
US9037687B2 (en) | 2015-05-19 |
EP2242030A2 (en) | 2010-10-20 |
CN101866434B (en) | 2013-04-03 |
JP5549854B2 (en) | 2014-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9037687B2 (en) | Information processing apparatus, method and program for writing file system metadata of plural operating systems | |
US9946558B2 (en) | Apparatus, method and system for activating an operating system based on a unified command | |
JPWO2005124560A1 (en) | Information management apparatus and information management method | |
JP4702628B2 (en) | Electronic device, information processing method, and program | |
US11039288B2 (en) | Information processing apparatus, information processing method, and program | |
US8328104B2 (en) | Storage device management systems and methods | |
EP2620897A1 (en) | Method, device and system for displaying radio frequency identification application information | |
TW201840215A (en) | PRIVACY AND SECURITY IN UICC/eSE LOGGING | |
US7800517B2 (en) | Information processing apparatus, information processing method, and computer program | |
CN101996333B (en) | Information processing apparatus, program, and information processing system | |
US20060032904A1 (en) | IC card creation method and system thereof | |
JP2007052492A (en) | Information processor, information processing method, and program | |
JP6515850B2 (en) | INFORMATION PROCESSING APPARATUS, IC CHIP, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM | |
JP4587021B2 (en) | Information processing apparatus and method, recording medium, and program | |
EP3962016A1 (en) | Information processing device, information processing method, and program | |
US20100200650A1 (en) | Mobile communication device and method for recovering mifare memory | |
KR101020059B1 (en) | Method for Adjusting Memory of Working Element File in ICC | |
JP2005352963A (en) | Information managing apparatus and control method therefor | |
WO2010113284A1 (en) | Information device management system, information device, and information device management method | |
JP5218978B2 (en) | Installation information registration system and method | |
JP2007249544A (en) | Electronic medium and information terminal including the same | |
JP2006222706A (en) | Data writing processing method for mobile phone with noncontact ic function | |
KR20070022737A (en) | Information management device and information management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SONY CORPORATION, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SUGIYAMA, HIROKAZU;REEL/FRAME:024190/0940 Effective date: 20100302 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230519 |